Reversing FreeRTOS on embedded devices

RECON-BRX-2017-FreeRTOS_Embedded_Reversing RECON-BRX-2017-FreeRTOS_Embedded_Reversing

01.03.2017 Views

Reverse engineering on Embedded • String analysis does not help • There are no syscalls on ong>FreeRTOSong> • There is no memory protection • IDA by default will not detect the Entry point. ……… can we find the Entry point ? 30 RECON 2017 Brussels

The entry point • STM32 has some default interrupts which are controlled by handlers. • In order to know where is each handler there is table called Interrupt Vector Table, which holds the address for each interrupt. • One of these interrupts is the reset. • What is boot rather then a reset interrupt?! 31 RECON 2017 Brussels

Reverse engineering <strong>on</strong> Embedded<br />

• String analysis does not help<br />

• There are no syscalls <strong>on</strong> <str<strong>on</strong>g>FreeRTOS</str<strong>on</strong>g><br />

• There is no memory protecti<strong>on</strong><br />

• IDA by default will not detect the Entry point.<br />

……… can we find the Entry point ?<br />

30 RECON 2017 Brussels

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!